Briefly describe the windows native api

Assignment Help Assembly Language
Reference no: EM132572924 , Length: 6 pages

Discussion

This week's discussion will focus on the Win32 API that is discussed in more depth in Chapter 7. Each student will be assigned a Win32 function to research on the MSDN library and share their findings. Explain the functions usage, return type, parameters, parameter data types, and a potential real-world scenario where malware may make use of this function. Which dll contains the function's definition? Also, provide a code snippet in either C or assembly as an example of the function's usage. If MSDN provides a code example, don't just blatantly copy the code. That tells me nothing other than you know how to copy and paste. Demonstrate that you understand how to read a function's documentation and usage. If you are super motivated, provide both high level source code and assembly code!

As an example, I attached a copy of my analysis on the CreateFile() API Function.

You can pick your own function to discuss from the below list. If there is another function you read about that's not on the list, then you can discuss that function instead. Lets try to avoid duplicates, but I know this is difficult to deconflict so no worries if we have a function collision. I do not need an exhaustive list of all the potential constants for each parameter. Nor do I want a copy and paste from the MSDN documentation. I can read the documentation myself, there is no need to reproduce it. Instead focus on what you think is important. If your analysis is longer than mine, then you did too much work! Typically, the first hit from a google search will bring you to the correct MSDN documentation.

Part 1 - Diffuse the Bomb

The part 1 lab exercise is based on material covered in chapters 4, 5, and 6.

There is a bomb on your system! Your reverse engineering skills are required to diffuse the bomb and save countless bits. Load bomb.exe into IDA to discover the keys to diffuse the bomb. You can attempt each stage as many times as needed. All stages must be completed in order. Do not tamper with the bomb's binary, as it may invoke an accidental discharge. Only use static code analysis via IDA to find the keys.

There are five stages to diffuse. For each stage, record the key and provide a summary of the code construct or algorithm used for the key. In other words, did the bomb test for the stage's key using an if-statement, switch, loop, or some other variation? You should include screenshots from your IDA display to show where you discovered the key.

If you are stuck at a stage and wish to attempt later stages, ask your chief binary explosive ordnance disposal officer (your instructor) for that stage's key. However, you will not receive credit for solving that stage.

There is a bonus stage unlocked after the bomb is diffused. You may wish to attempt that stage for bragging rights. There is also an optional secret stage that you must unlock before it can be attempted. Your instructor may grant extra credit for unlocking and solving the secret stage.

1. Stage 1.
a. Key:
b. Briefly describe how you found the key.

2. Stage 2.
a. Key:
b. Briefly describe how you found the key.

3. Stage 3.
There are several possible keys for this stage. For full credit, provide all possible keys.
a. Key:
b. Briefly describe how you found the key.

4. Stage 4.
a. Key:
b. Briefly describe how you found the key.

5. Stage 5.
a. Key:
b. Briefly describe how you found the key.

6. Bonus Stage.
a. Key:
b. Briefly describe how you found the key.

7. Which compiler do you suspect was used to build this bomb? What is your evidence?

Part 2 - Analyzing Windows Programs

1) What is a handle in the Windows OS?

2) NTFS Alternate data streams (ADS) are sometimes used to stage malware or hide information. Create an ADS in the Lab3 folder that stores the message "Norwich Forever". Show a screenshot of dir and dir /R to validate your ADS.

3) List and briefly describe the five Windows Registry Root Keys.

4) Describe what the following code segment is doing. Which function is being called? From what is provided, what are the values (or locations) of the function's parameters. Why would malware contain such code?

5) Analyze the following source code. What is the purpose of the WSAStartup() function? Explain what kind of socket is being created by examining the parameters.

6) What are COM objects, and how are they accessed?

7) Briefly explain the following code.

8) Briefly describe the Windows Native API. Which dll contains Native API functions? How can you easily recognize a Native API call when analyzing function calls?

For the following questions, analyze the sample Lab3.exe.

9) Document the basic static file information.

10) Using IDA, analyze the sample. Your analysis must contain considerable depth to explain the program's mechanics and convey comprehension of the concepts. Include some relevant screenshots from IDA that contain interesting information. Analysis of some of the malware's functionality is provided below for you as an example. The provided analysis will help you determine the program's overall intent. Your analysis should cover:

a. Persistence mechanisms (registry, services, functions used, etc).
b. Mutex information (name of mutex, purpose of mutex, functions used, etc).
c. Any thread information (functions used to create thread, thread StartAddress information, number of threads created, etc.)
d. Networking information (Domains, protocols, functions used, etc.).
e. Conclusions. What do you suppose is the malware's overall intent?How would you classify this malware (ransomware, worm, adware, logic bomb, etc)? Can you recommend a way to remove the malware's persistence (HINT: sc command-line program).

Attachment:- Discussion.rar

Reference no: EM132572924

Questions Cloud

How many tubs of gelato must the store sell per week : The fixed costs per week are $1350. How many tubs of gelato must the store sell per week in order to break even
Analyze role of social worker in helping to plan end of life : Analyzes the role of the social worker in helping to plan end-of-life care. Include possible consideration of palliative care, euthanasia, hospice care.
Compute company predetermined overhead rate : Compute the company's predetermined overhead rate for the year and the amount of underapplied or overapplied overhead for the year.
What edmund morgan called the american paradox : What Edmund Morgan called the American Paradox vis-à-vis not only African Americans, but also Native Americans and other nonwhites?
Briefly describe the windows native api : Briefly describe the Windows Native API. Which dll contains Native API functions? How can you easily recognize a Native API call when analyzing function calls
Describe two things learned from the invisible war film : Describe TWO things you learned from the Invisible War film that you did not previously know about sexual assault in the U.S. military.
Different types of signaling systems to human body : Further discuss what common features are shared by most cell signaling systems.
Products of anaerobic respiration remain unchanged : You have been working in a biochemistry lab and have discovered a drug that allows anaerobic cellular respiration to proceed
Describe the theory of knowledge called skepticism : Describe the theory of knowledge called skepticism. Consider the skeptic's charge that we can never be confident about the reliability of our normal sources

Reviews

Write a Review

Assembly Language Questions & Answers

  Write an assembly program

Run your program using decimal 5 as input for x. Provide a screenshot showing the result of program execution in decimal.

  What would be the ieee 754 double precision binary

What would be the IEEE 754 double precision binary representation of the floating point value 2.71828×10-13? Express your final answer as a 16-hexdigit number and explain how your answer was obtained for full credit.

  Implement a reverse polish calculator in marie

I want you to implement a reverse polish calculator in MARIE. This calculator must be implemented with or support the following requirements

  Assignment related to arm assembly

The 8-Segment display and LEDs will show status of the safe: U: indicates safe is unlocked, L: indicates safe is locked, P: indicates safe is programming a code, C: indicates safe is confirming a new code

  Write a m68k assembly language program

A second sequence of equal length is stored at memory location $700 onward. Each sequence ends with the character $0 (i.e., the ASCII NUL character).

  Relative addressing mode is a special way

Relative addressing mode is a special way to specify operands. Which instructions are associated with the relative addressing mode? Why do you think it was called "relative" addressing mode? Hint: Use a search engine to find out about "portable code"

  Write program which should first ask for five random numbers

You are to write a program which should first ask for 5 random numbers from 0-20 (user will input these numbers in no preset order). Input these 5 numbers in variables called num1, num2, num3, num4, and num5.

  Write an assembly language version

write an assembly language version of the following c code segment

  What have you done towards the goals

Project - What are the most significant advantages of your ISA (with regard to the two programs, hardware implementation, ease of programming, etc)

  Allot op-codes and add microcode to microprogram

Allot op-codes and add microcode to microprogram of Mic-1 to implement following instructions which are then included with IJVM instruction set.

  Write a subroutine assembly language code using nasm

You have to write a subroutine (assembly language code using NASM) for the given equation - You cannot use MUL or DIV instructions, you have to perform multiplication and division (if required) using shift operations.

  How much bits of the spaces

Access to main memory address which sub-spaces are divided and how much bits of the spaces - Write allocate for write and simple write back for write back

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd